• No results found

Both members of the group worked well together and have worked together in previous projects. Conflicts were rare and easily solvable by a short disputation. Meetings were once a week with employer and supervisor and progress since last meeting and plans until next meeting were presented. Both employer and supervisor were able to provide feedback on the progress.

The project was done incrementally in stages focusing on specific parts of the system.

This provided flexibility when both group members got ill for two weeks and the schedule had to change. Pair programming enabled the group to stay focused for longer periods of time and produce higher quality code.

Bibliography

[1] Uninett. Best practice documents. Accessed 2016-04-23. URL: https://www.

uninett.no/en/tjenester/best-practice-documents.

[2] Foundation, O. C. P. ONIE | Open Network Install Environment. Accessed 2016-01-19. URL:http://onie.org/.

[3] Curt & Ccardenas. Networking/ONIE/NOS Status - OpenCompute. Accessed 2016-01-19. URL: http://www.opencompute.org/wiki/Networking/ONIE/NOS_

Status.

[4] Cisco. Cisco’s One Platform Kit (onePK). Accessed 2016-01-27. URL: https:

//developer.cisco.com/site/onepk/.

[5] Sherwood, R. April 2014. Sdn is devops for networking. USENIX, 39(2). URL:

https://www.usenix.org/system/files/login/articles/10_sherwood.pdf.

[6] Sommerville, I. 2011.Software Engineering. Pearson education, 9 edition.

[7] Sindre, G. & Opdahl, A. L. June 2004. Eliciting security requirements with misuse cases. Requirements Engineering, 10(1), 34–44. Accessed 2016-04-23.

URL: http://link.springer.com/article/10.1007/s00766-004-0194-4, doi:

10.1007/s00766-004-0194-4.

[8] Justis- og beredskapsdepartementet. Regulations on the processing of personal data (personal data regulations) - Lovdata. Accessed 2016-04-21. URL:https:

//lovdata.no/dokument/NL/lov/2000-04-14-31.

[9] Justis- og beredskapsdepartementet. Act relating to the processing of personal data (personal data act) - Lovdata. Accessed 2016-04-21. URL:https://lovdata.no/

dokument/SF/forskrift/2000-12-15-1265.

[10] Uninett. Liste over gjeldende beste praksis fagspesifikasjoner (UFS) | Uninett. Ac-cessed 2016-02-01. URL:https://www.uninett.no/ferdige-ufs.

[11] Ramirez, J. A. S. April 2012. PHP: a fractal of bad design. Accessed 2016-05-06.

URL:https://eev.ee/blog/2012/04/09/php-a-fractal-of-bad-design/.

[12] Cisco. Using AutoInstall and Setup. Accessed 2016-02-02. URL:

http://cisco.com/c/en/us/td/docs/ios/12_2/configfun/configuration/

guide/ffun_c/fcf002.html.

[13] Internet Systems Consortium. DHCP | Internet Systems Consortium. Accessed 2016-04-27. URL:https://www.isc.org/downloads/dhcp/.

[14] Kelley, S. Dnsmasq - network services for small networks. Accessed 2016-04-27.

URL:http://www.thekelleys.org.uk/dnsmasq/doc.html.

[15] Lemon, T. dhcpd(8): Dynamic Host config Protocol Server - Linux man page. Ac-cessed 2016-04-27. URL:http://linux.die.net/man/8/dhcpd.

[16] Internet Systems Consortium. Kea DHCP server | Internet Systems Consortium.

Accessed 2016-04-27. URL:https://www.isc.org/kea/.

[17] Hammer-Lahav, E. The OAuth 1.0 Protocol. Accessed 2016-04-27. URL:https:

//tools.ietf.org/html/rfc5849.

[18] Hardt, D. The OAuth 2.0 Authorization Framework. Accessed 2016-04-27. URL:

https://tools.ietf.org/html/rfc6749.

[19] Bradley, J., Sakimura, N., & Jones, M. JSON Web Token (JWT). Accessed 2016-04-27. URL:https://tools.ietf.org/html/rfc7519.

[20] Christie, T. Status codes. Accessed 2016-05-09. URL: http://www.

django-rest-framework.org/api-guide/status-codes/.

[21] pashtuk. October 2010. MAC Addresses of Switches. Accessed 2016-05-09. URL: https://ccie20728.wordpress.com/2010/10/07/

mac-addresses-of-switches/.

[22] Cisco. Secure Shell Configuration Guide, Cisco IOS Release 15s - Secure Copy [Support]. Accessed 2016-02-03. URL: http://cisco.com/c/en/us/td/docs/

ios-xml/ios/sec_usr_ssh/configuration/15-s/sec-usr-ssh-15-s-book/

sec-secure-copy.html.

[23] Cisco. Using AutoInstall and Setup. Accessed 2016-02-02. URL: http:

//www.cisco.com/c/en/us/td/docs/ios/12_2/configfun/configuration/

guide/ffun_c/fcf002.pdf.

[24] Juniper Networks. Configuring Zero Touch Provisioning - Technical Document-ation - Support - Juniper Networks. Accessed 2016-04-28. URL: http://www.

juniper.net/documentation/en_US/junos15.1/topics/task/configuration/

software-image-and-configuration-automatic-provisioning-confguring.

html.

[25] Cisco. Autoinstall using dhcp for lan interfaces [cisco ios software releases 12.1 t].

Accessed 2016-03-07. URL:http://www.cisco.com/en/US/docs/ios/12_1t/12_

1t5/feature/guide/dt_dhcpa.html.

[26] Cisco. Configuring Secure Shell on Routers and Switches Running Cisco IOS. Accessed 2016-01-19. URL: http://cisco.com/c/en/us/support/docs/

security-vpn/secure-shell-ssh/4145-ssh.html.

[27] Cisco. Configuring SNMP Support. Accessed 2016-01-19. URL:

http://cisco.com/c/en/us/td/docs/ios/12_2/configfun/configuration/

guide/ffun_c/fcf014.html.

[28] Pennington, M. & fredpbaker. snmp - What is the OID needed to gener-ate a ssh crypto key on a Cisco switch or router running IOS using sn-mpset? - Network Engineering Stack Exchange. Accessed 2016-02-08.

URL: http://networkengineering.stackexchange.com/questions/2985/

what-is-the-oid-needed-to-generate-a-ssh-crypto-key-on-a-cisco-switch-or-router.

[29] Notarus, M. Writing a cisco device’s config via snmp. Accessed 2016-02-08. URL:

http://www.notarus.net/networking/cisco_snmp_config.html.

[30] Raaen, B. C. copying Cisco configs using snmp – www.brianraaen.com.

Accessed 2016-02-09. URL: http://www.brianraaen.com/2015/12/11/

copying-cisco-configs-using-snmp/.

[31] Harrington, D., Wijnen, B., & Presuhn, R. An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks. Accessed 2016-05-05. URL:https://tools.ietf.org/html/rfc3411.

[32] Wasserman, M. Using the NETCONF Protocol over Secure Shell (SSH). Accessed 2016-02-02. URL:https://tools.ietf.org/html/rfc6242.

[33] Bierman, A. Netconf Central NETCONF Documentation. Accessed 2016-02-03.

URL:http://www.netconfcentral.org/netconf_docs.

[34] Cisco. NETCONF over SSHv2. Accessed 2016-01-19. URL:http://cisco.com/c/

en/us/td/docs/ios/12_2sr/12_2sra/feature/guide/srnetcon.html.

[35] Cisco. Cisco Networking Services Configuration Guide, Cisco IOS XE Re-lease 3s - Network Configuration Protocol [Support]. Accessed 2016-01-19.

URL: http://cisco.com/c/en/us/td/docs/ios-xml/ios/cns/configuration/

xe-3s/cns-xe-3s-book/cns-netconf.html.

[36] Cisco. Cisco IOS Image Verification. Accessed 2016-03-13. URL: http://www.

cisco.com/c/en/us/about/security-center/ios-image-verification.html.

[37] Cisco. Cisco IOS Software Integrity Assurance. Accessed 2016-03-13. URL: http://www.cisco.com/c/en/us/about/security-center/

integrity-assurance.html.

[38] Cisco. Chapter: Md5 file validation. Accessed 2016-02-02. URL:

http://cisco.com/c/en/us/td/docs/ios-xml/ios/sys-image-mgmt/

configuration/15-s/sysimgmgmt-15-s-book/sysimgmgmt-md5.html.

[39] Stølen, K. & Erdogan, G. The CORAS Method. Accessed 2016-04-23. URL:http:

//coras.sourceforge.net/.

[40] den Braber, F., Hogganvik, I., Lund, M., Stølen, K., & Vraalsen, F. 2007. Model-based security analysis in seven steps—a guided tour to the coras method. BT Technology Journal, 25(1), 101–117.

[41] django/django. Accessed 2016-04-27. URL: https://github.com/django/

django.

[42] Nowakowski, R. django-macaddress/django-macaddress. Accessed 2016-04-27.

URL:https://github.com/django-macaddress/django-macaddress.

[43] Balcerzak, L. django-guardian/django-guardian. Accessed 2016-04-27. URL:

https://github.com/django-guardian/django-guardian.

[44] Cygnus Networks GmbH. CygnusNetworks/pypureomapi. Accessed 2016-04-27.

URL:https://github.com/CygnusNetworks/pypureomapi.

[45] Houghton, A. al45tair / netifaces. Accessed 2016-04-27. URL: https://

bitbucket.org/al45tair/netifaces.

[46] Jenks, G. grantjenks/python-tribool. Accessed 2016-04-27. URL:https://github.

com/grantjenks/python-tribool.

[47] VanderLinden, J. & Neustrom, P. django-pci/django-axes. Accessed 2016-04-27.

URL:https://github.com/django-pci/django-axes.

[48] Nielsen, J. Why You Only Need to Test with 5 Users. Ac-cessed 2016-05-10. URL: https://www.nngroup.com/articles/

why-you-only-need-to-test-with-5-users/.

[49] van Rossum, G., Warsaw, B., & Coghlan, N. PEP 8 – Style Guide for Python Code.

Accessed 2016-04-27. URL:https://www.python.org/dev/peps/pep-0008/.

[50] Filippov, D. Write Clean, Professional, Maintainable, Quality Code in Python.

Accessed 2016-04-27. URL: http://blog.jetbrains.com/pycharm/2014/06/

write-clean-professional-maintainable-quality-code-in-python/.

[51] Python Software Foundation. What’s New In Python 3.0 — Python 3.5.1 document-ation. Accessed 2016-05-03. URL:https://docs.python.org/3/whatsnew/3.0.

html.

[52] Wilcox, C. Python 3 is Winning Library Developer Support. Accessed 2016-05-02. URL:http://blogs.msdn.microsoft.com/pythonengineering/2016/03/

08/python-3-is-winning/.

[53] Internet Systems Consortium. DHCP | Internet Systems Consortium. Accessed 2016-04-27. URL:https://www.isc.org/downloads/dhcp/.

[54] Cisco. NETCONF over BEEP. Accessed 2016-02-03. URL:http://cisco.com/c/

en/us/td/docs/ios/12_4t/12_4t11/htnetbe.html.

[55] TCC_2. November 2009. A Not enough space in NVRAM er-ror message occurs when attempting to save the configuration be-cause the configuration size is larger than NVRAM. Accessed 2016-05-12. URL: https://supportforums.cisco.com/document/9951/

not-enough-space-nvram-error-message-occurs-when-attempting-save-configuration-because.

[56] Brandl, G. Overview — Sphinx 1.4.1 documentation. Accessed 2016-05-04. URL:

http://www.sphinx-doc.org/en/stable/.

[57] Jackson, C., Barth, A., & Hodges, J. HTTP Strict Transport Security (HSTS). Ac-cessed 2016-05-13. URL: https://tools.ietf.org/html/rfc6797#section-2.

3.1.

[58] Christie, T. Django REST framework. Accessed 2016-05-02. URL: http://www.

django-rest-framework.org/#api-guide.

[59] Juniper Networks. Juniper Networks - Network Security & Performance. Accessed 2016-05-03. URL:http://www.juniper.net/us/en/.

A User Manual for GRANCONF

First start your browser and open the website to the GRANCONF system. In this guide GRANCONF is available on https://10.10.0.2/admin but this may vary. Consult the local documentation or system administrator for the URL.

Figure 11: Log in to GRANCONF

Log in using your username and password.